IT News - MFA
2020 Mar 22
#90551
Biometric Two-Factor Authentication (2FA) - Pros And Cons
Security Boulevard, March 10th, 2020

Megan Anderson writes in Security Boulevard, "The data is extremely difficult to replicate, and because it's a relatively new technology, methods of bypassing it are still in their infancy. This has led some to wonder whether it's the next generation of identity security. We seek to explore that idea in our list of biometric

Biometric 2FA Overview

Biometric 2FA, or biometric authentication, is a method of verifying a user's identity using a piece of 'who they are' such as their fingerprint, facial features, hand shape, iris structure, voice, or typing behavior (such as how strongly a user depresses keys on their keyboard)..."
(Get More Information . .)

2020 Mar 22
#90552
How To Evaluate The ROI Of 2FA
Security Boulevard, March 13th, 2020

"While 2FA is considered to be a standard in identity security practices today, it can be a headache for some organizations," opines Megan Anderson in Security Boulevard.

"Organizations know it's more secure than only requiring a username and password, but 2FA reduces efficiency and can require the admin to dedicate large portions of time to manual integration and management. When admins spend a lot of their time integrating and managing a tool that slows down the user authentication process to some degree, it can potentially translate into a loss of productivity. As a result, some may question the return on investment (ROI) of 2FA..."
(Get More Information . .)

2020 Mar 22
#90553
Two-Factor Authentication Isn'T As Secure As You Might Expect
CNET, March 9th, 2020

"You've probably heard this security advice: protect your accounts by using two-factor authentication," opines Stephen Shankland in CNET.

"You'll make life hard for hackers, so the reasoning goes, if you pair a password with a code sent by text message or generated by an app like Google Authenticator.

Here's the problem: It can be easily bypassed. Just ask Twitter Chief Executive Jack Dorsey. Hackers gained access to Dorsey's Twitter account using a SIM swap attack that involves fooling a carrier into switching mobile service to a new phone...."
(Get More Information . .)

See all archived IT News - MFA articles See all articles from this issue